Protocol agent field details
This topic provides information about the field options that are available in the new protocol type dialog-box, when you create a new protocol agent for a network service.
Protocol Agent | Field | Type | Description |
---|---|---|---|
FP_CIS | Name | Text field | Enter a custom name for the protocol. |
Description | Text field | Enter a description for the protocol for easy identification. | |
Handle incoming CIS connections | Check-box |
|
|
GRE | Name | Text field | Enter a custom name for the protocol. |
Description | Text field | Enter a description for the protocol for easy identification. | |
Apply Tunnel Rematch | Check-box |
|
|
Tunnel IPv4 protocol | Check-box |
|
|
Tunnel IPv6 protocol | Check-box |
|
|
IPv4 Encapsulation | Name | Text field | Enter a custom name for the protocol. |
Description | Text field | Enter a description for the protocol for easy identification. | |
Apply Tunnel Rematch | Check-box |
|
|
Next Ethernet Type | Text field | Enter the Ethernet frame type used for examining the encapsulated packet. | |
DNS | Name | Text field | Enter a custom name for the protocol. |
Description | Text field | Enter a description for the protocol for easy identification. | |
Enforce DNS protocol usage | Check-box |
|
|
Deny DDNS updates | Check-box |
|
|
Deny DNS zone transfer | Check-box |
|
|
Enforce Google Safesearch | Check-box |
|
|
Enforce strict Bing Safesearch | Check-box |
|
|
Enforce strict DuckDuckGo Safesearch | Check-box |
|
|
Enforce Youtube Safesearch | Drop-down list |
Select the safesearch mode from the drop-down list:
|
|
FTP or SSM FTP Proxy | Name | Text field | Enter a custom name for the protocol. |
Description | Text field | Enter a description for the protocol for easy identification. | |
Allow related connections | Check-box |
|
|
Allow active mode | Check-box | Checked — Server is allowed to open data connections to the client (according to information exchanged in the control connection). Unchecked — Server-initiated data connections are forbidden. |
|
Allow passive mode | Check-box |
|
|
Control data inspection mode | Check-box |
|
|
Highest allowed source port for Active data connection or Lowest allowed source port for Active data connection |
Text Field |
Enter a port value to limit the range of allowed source ports for active data connections on the server. Value 0 for the lowest port means that the server always uses the port number immediately preceding the destination port. If the server uses a standard port, both the lowest and highest port number must be 0. |
|
Redirect to Proxy Server | Text field |
Select the Proxy Server to which the connections are redirected.
Note: The recommended method for forwarding traffic to a proxy service is to use Access rules.
(Optional) Specify the IP Address Translation Range (IPv4 only) and the Port Translation Range for the redirection. To specify a single IP address, enter the same IP address in both fields. Note: This option is not supported for SSM Proxies.
|
|
HTTP or HTTPS | Name | Text field | Enter a custom name for the protocol. |
Description | Text field | Enter a description for the protocol for easy identification. | |
TLS inspection (HTTPS only) |
Drop-down Menu | Controls whether TLS decryption of HTTPS traffic is enabled, not enabled, or forbidden.
|
|
Logging of Accessed URLs | Check-box |
|
|
Optimized server stream fingerprinting | Check-box |
|
|
Enforce SafeSearch | Check-box |
|
|
Redirect connections to Proxy Server | Text Field |
Specify the IP Address Translation Range (IPv4 only) and the Port Translation Range for the redirection. Note: This option is not supported for SSM Proxies.
|
|
Strip QUIC support from server replies | Check-box |
|
|
HTTP with SSM HTTP Proxy | Name | Text Field | Enter a custom name for the protocol. |
Description | Text Field | Enter a description for the protocol for easy identification. | |
Logging of accessed URLs | Check-box |
|
|
Optimized server stream fingerprinting | Check-box |
|
|
Redirect to Proxy Server | Text Field | Specify the IP Address Translation Range (IPv4 only) and the Port Translation Range for the redirection. Note: This option is not supported for SSM Proxies.
|
|
Enforce SafeSearch | Check-box |
|
|
Enforce Strict Headers | Check-box | When selected, the proxy blocks HTTP requests and responses that do not comply with the HTTP protocol standards. | |
Request Validation | Check-box |
When selected, the proxy validates HTTP requests. |
|
Disallow Unicode in URL Paths | Check-box | When selected, unicode-encoded text is not allowed in URL paths. | |
Disallow Unicode URL Queries | Check-box | When selected, unicode-encoded text is not allowed in query strings in URLs. | |
Enforce Strict URL Paths | Check-box | When selected, the proxy blocks URL paths that contain characters that are not allowed by the HTTP protocol standards. | |
Enforce Strict URL Queries | Check-box | When selected, the proxy blocks queries that contain characters that are not allowed by the HTTP protocol standards. | |
URL Normalization Validation | Drop-down list |
Specifies how URL normalization is applied to HTTP requests:
|
|
Maximum URL Length | Text Field | Specifies the maximum number of characters allowed in URLs. | |
Require HTTP Version | Check-box |
When selected, the proxy requires the HTTP request to include an HTTP version string. |
|
Allow HTTP version 1.0 | Check-box | When selected, the proxy allows HTTP requests that specify HTTP version 1.0 as the version string. | |
Allow HTTP version 1.1 | Check-box | When selected, the proxy allows HTTP requests that specify HTTP version 1.1 as the version string. | |
Allow or Deny Specified URL Matches | Drop-down list |
Specifies whether matching URLs are allowed or denied:
|
|
URL Match List | Text Field | Specifies the criteria for matching URLs. | |
Allowed HTTP Commands | Drop-down list |
|
|
Deny SOAP | Check-box | When selected, the proxy denies the use of simple object access protocol (SOAP) in HTTP requests. | |
Log URLs | Check-box | When selected, the proxy logs the URLs in HTTP requests. | |
HTTP with SSM TCP Proxy or HTTPS with SSM TCP Proxy | Name | Text Field | Enter a custom name for the protocol. |
Description | Text Field | Enter a description for the protocol for easy identification. | |
TLS Inspection | Drop-down list | Controls whether TLS decryption of HTTPS traffic is enabled, not enabled, or forbidden.
|
|
HTTPS Inspection Exceptions | Text Field/Drop-down list |
Specifies the HTTPS Inspection Exceptions according to which traffic is decrypted and inspected or allowed to pass without decryption. Click in the text field to select an HTTPS Inspection Exceptions element. Note: You can click the New Inspection Policy button to create a new inspection policy.
|
|
Logging of accessed URLS | Check-box |
|
|
Optimized server stream fingerprinting | Check-box |
|
|
Enforce SafeSearch | Check-box |
|
|
H323 | Name | Text field | Enter a custom name for the protocol. |
Description | Text field | Enter a description for the protocol for easy identification. | |
Allow related connections | Check-box |
|
|
Allow special logical channels through (No NAT) | Check-box |
|
|
IMAPS | Name | Text field | Enter a custom name for the protocol. |
Description | Text field | Enter a description for the protocol for easy identification. | |
TLS inspection | Drop-down list | Controls whether TLS decryption of HTTPS traffic is enabled, not enabled, or forbidden.
|
|
IMAPS Inspection Exceptions | Text Field/Drop-down list |
Specifies the IMAPS Inspection Exceptions according to which traffic is decrypted and inspected or allowed to pass without decryption. Click in the text field to select an IMAPS Inspection Exceptions element. Note: You can click the New Inspection Policy button to create a new inspection policy.
|
|
MSRPC | Name | Text field | Enter a custom name for the protocol. |
Description | Text field | Enter a description for the protocol for easy identification. | |
Allow related connections | Check-box |
|
|
Allow MS Exchange Remote administration service | Check-box |
|
|
Allow MS Exchange user services | Check-box |
|
|
Allow any UUID in endpoint mapping | Check-box |
|
|
Allow other RPC traffic | Check-box |
|
|
Oracle | Name | Text Field | Enter a custom name for the protocol. |
Description | Text Field | Enter a description for the protocol for easy identification. | |
Allow related connections | Check-box |
|
|
Max. length allowed for one TNS packet | Text Field | Enter the maximum amount of TCP payload data that each Oracle TNS packet is allowed to carry. | |
Netmask for allowed server addresses | Text Field | Enter a netmask for limiting the allowed traffic. The value 255.255.255.255 allows the database connection only to the address in which the Oracle Listener service is located. The value 0.0.0.0 allows database connections to all addresses. | |
Set checksum to zero for modified TNS packets | Check-box |
|
|
POP3S | Name | Text field | Enter a custom name for the protocol. |
Description | Text field | Enter a description for the protocol for easy identification. | |
TLS Inspection | Drop-down list | Controls whether TLS decryption of HTTPS traffic is enabled, not enabled, or forbidden.
|
|
POP3S Inspection Exceptions | Text Field/Drop-down list | Specifies the POP3S Inspection Exceptions according to which traffic is decrypted and inspected or allowed to pass without decryption. Click to select an POP3S Inspection Exceptions
element. Note: You can click the New Inspection Policy button to create a new inspection policy.
|
|
Protocol Identification | Name | Text Field | Enter a custom name for the protocol. |
Description | Text Field | Enter a description for the protocol for easy identification. | |
TLS Inspection | Drop-down list | Controls whether TLS decryption of HTTPS traffic is enabled, not enabled, or forbidden.
|
|
HTTPS Inspection Exceptions | Text Field/Drop-down list | Specifies the HTTPS Inspection Exceptions according to which traffic is decrypted and inspected or allowed to pass without decryption. Click to select an HTTPS Inspection Exceptions
element. Note: You can click the New Inspection Policy button to create a new inspection policy.
|
|
RTSP | Name | Text Field | Enter a custom name for the protocol. |
Description | Text Field | Enter a description for the protocol for easy identification. | |
Allow related connections | Check-box |
|
|
Shell | Name | Text Field | Enter a custom name for the protocol. |
Description | Text Field | Enter a description for the protocol for easy identification. | |
Allow related connections | Check-box |
|
|
SIP | Name | Text Field | Enter a custom name for the protocol. |
Description | Text Field | Enter a description for the protocol for easy identification. | |
Allow related connections | Check-box |
|
|
Enforce client side media | Check-box |
|
|
Enforce server side media | Check-box |
|
|
Maximum number of calls | Text Field | The maximum number of calls allowed by the Access rule. If the value is 0, no limit is set for the number of calls. | |
SMTP or SMTPS | Name | Text Field | Enter a custom name for the protocol. |
Description | Text Field | Enter a description for the protocol for easy identification. | |
Redirect to Proxy Server | Text Field | Specify the IP Address Translation Range (IPv4 only) and the Port Translation Range for the redirection. Note: This option is not supported for SSM Proxies.
|
|
TLS Inspection | Drop-down list | Controls whether TLS decryption of HTTPS traffic is enabled, not enabled, or forbidden.
|
|
HTTPS Inspection Exceptions | Text Field/Drop-down list | Specifies the HTTPS Inspection Exceptions according to which traffic is decrypted and inspected or allowed to pass without decryption. Click to select an HTTPS Inspection Exceptions
element. Note: You can click the New Inspection Policy button to create a new inspection policy.
|
|
SSH or SSH with SSM TCP Proxy | Name | Text Field | Enter a custom name for the protocol. |
Description | Text Field | Enter a description for the protocol for easy identification. | |
Make protocol validation | Check-box |
|
|
Bytes allowed from client before Server ID | Text Field | Amount of data that the client is allowed to send to the server before the server sends its own identification string. | |
Bytes allowed from server before Client ID | Text Field | Amount of data that the server can send to the client before the client sends its own identification string. | |
Bytes allowed from server before Server ID | Text Field | Amount of data that the server can send to the client before the server sends its own identification string. | |
Sunrpc | Name | Text Field | Enter a custom name for the protocol. |
Description | Text Field | Enter a description for the protocol for easy identification. | |
Learn RPC program number to port mapping for future service matches | Check-box | When selected, Protocol Agent is enabled. | |
TCP Proxy | Name | Text Field | Enter a custom name for the protocol. |
Description | Text Field | Enter a description for the protocol for easy identification. | |
Abort on close | Text Field | Timeout in seconds for aborting a connection counted from when one of the communicating parties initiates the connection closing. The connection is aborted by sending TCP Reset packets to the unresponsive endpoint. Setting this value to 0 disables this timeout (connections are left open). | |
Idle timeout | Text Field | Timeout in seconds for closing a connection after the latest transmission. Setting this value to 0 disables this timeout (connections are left open). | |
Use proxy | Check-box |
|
|
NetBIOS | Name | Text Field | Enter a custom name for the protocol. |
Description | Text Field | Enter a description for the protocol for easy identification. | |
Make corresponding NAT modifications to payload | Check-box |
|
|
TFTP or SSM TFTP Proxy | Name | Text Field | Enter a custom name for the protocol. |
Description | Text Field | Enter a description for the protocol for easy identification. | |
Allow related connections | Check-box |
|
|
Allow read | Check-box |
|
|
Allow write | Check-box |
|
|
Log filenames and paths | Check-box |
|
|
QUIC | Name | Text Field | Enter a custom name for the protocol. |
Description | Text Field | Enter a description for the protocol for easy identification. | |
Discard QUIC if inspection not possible | Drop-down list |
|
|
Tunnel IPv6 protocol | Check-box |
|
|
Next Ethernet Type | Text field | Enter the Ethernet frame type used for examining the encapsulated packet. | |
SSM HTTP Proxy | Name | Text Field | Enter a custom name for the protocol. |
Description | Text Field | Enter a description for the protocol for easy identification. | |
Enforce Strict Headers | Check-box | When selected, the proxy blocks HTTP requests and responses that do not comply with the HTTP protocol standards. | |
Request Validation | Check-box | When selected, the proxy validates HTTP requests. | |
Disallow Unicode in URL Paths | Check-box | When selected, unicode-encoded text is not allowed in URL paths. | |
Disallow Unicode URL Queries | Check-box | When selected, unicode-encoded text is not allowed in query strings in URLs. | |
Enforce Strict URL Paths | Check-box | When selected, the proxy blocks URL paths that contain characters that are not allowed by the HTTP protocol standards. | |
Enforce Strict URL Queries | Check-box | When selected, the proxy blocks queries that contain characters that are not allowed by the HTTP protocol standards. | |
URL Normalizatio Validation | Drop-down list | Specifies how URL normalization is applied to HTTP requests.
|
|
Maximum URL Length | Text Field | Specifies the maximum number of characters allowed in URLs. | |
Require HTTP Version | Check-box | When selected, the proxy requires the HTTP request to include an HTTP version string. | |
Allow HTTP version 1.0 | Check-box | When selected, the proxy allows HTTP requests that specify HTTP version 1.0 as the version string. | |
Allow HTTP version 1.1 | Check-box | When selected, the proxy allows HTTP requests that specify HTTP version 1.1 as the version string. | |
Allow or Deny Specified URL Matches | Drop-down list |
Specifies whether matching URLs are allowed or denied.
|
|
URL Match List | Text Field | Specifies the criteria for matching URLs. | |
Allow HTTP Commands | Drop-down list |
|
|
Deny SOAP | Check-box | When selected, the proxy denies the use of simple object access protocol (SOAP) in HTTP requests. | |
Log URL | Check-box | When selected, the proxy logs the URLs in HTTP requests. | |
Enforce TLS Decryption | Check-box | When select, enforces TLS decryption. | |
SSM DNS Proxy | Name | Text field | Enter a custom name for the protocol. |
Description | Text field | Enter a description for the protocol for easy identification. | |
Enforce DNS protocol usage | Check-box |
|
|
Deny DNS zone transfers | Check-box |
|
|
Enforce Google SafeSearch | Check-box |
|